Test network connections between any two pcs, Computer Networking

Use Packet Tracer software to model the network that you have designed, and configure the network to make sure it is running properly.

The following requirements should be met:

• All the PCs except the ones in the server room are workstations.

 In the server room, there is a Web Server and a DNS Server.

• Test network connections between any two PCs, and provide evidence.
• Assign appropriate IP addresses for all the workstations and servers in the network.
• Configure the DNS server and the web server.

Make sure any PC in the network can load the webpage from the web server properly. The work of Task 2 and 3 needs to be submitted in the electronic format. Please include the Packet Tracer file in the submission. Screenshots should be included in the report.

 

Posted Date: 3/21/2013 5:14:45 AM | Location : United States







Related Discussions:- Test network connections between any two pcs, Assignment Help, Ask Question on Test network connections between any two pcs, Get Answer, Expert's Help, Test network connections between any two pcs Discussions

Write discussion on Test network connections between any two pcs
Your posts are moderated
Related Questions
A modified NRZ code known as enhanced-NRZ (E-NRZ) operates on 7-bit words; inverting bits 2,3,6 and 7; and adding one parity bit to each word. The parity bit is chosen to make the

#include void subdomain(float x[ ], int istart, int ipoints) { int i; for (i = 0; i x[istart+i] = 123.456; } void sub(float x[ 10000], int npoints) {

Q. Show the Distribution of Name Space? Distribution of Name Space --Information for domain name space must be stored on multiple servers (DNS servers) to be efficient

Question: (a) Describe the importance of backups and the use of antivirus software. (b) With the help of an example/ illustration, explain the term encryption and explain

Determine the method to protect the Web servers The company should install additional levels of security measures since it is possible for hackers to generate and send data wit

What is Telnet It is a protocol or set of rules that uses to connect one computer to another computer in network. It is also called as a remote login. The telnet operates on cl

I have a project that need to be submit as soon as possible

What is Medium Access Control of Ethernet? The set of rules which make sure that each node in an Ethernet gets a fair amount of frame transmission opportunity, are known as the